A world model for ubiquitous computing environments is presented. It can be dynamically organized like a tree based on geographical containment, such as in a user-room-floor-build...
We construct an efficient identity based encryption system based on the standard learning with errors (LWE) problem. Our security proof holds in the standard model. The key step in...
A new user interaction method called interactive polygons is presented in this paper. These interaction polygons are designed for use with the Active Volume Model segmentation met...
Yaoyao Zhu, Tian Shen, Daniel P. Lopresti, Xiaolei...
Load sharing in the data centre is an essential strategy for meeting service levels in high volume and high availability services. We investigate the accuracy with which simple, cl...
Abstract. Web advertisers prefer the cost-per-action (CPA) advertisement model whereby an advertiser pays a web publisher according to the actual amount of transactions, rather tha...